CN106843853A - The method and apparatus for protecting user profile - Google Patents

The method and apparatus for protecting user profile Download PDF

Info

Publication number
CN106843853A
CN106843853A CN201611239459.2A CN201611239459A CN106843853A CN 106843853 A CN106843853 A CN 106843853A CN 201611239459 A CN201611239459 A CN 201611239459A CN 106843853 A CN106843853 A CN 106843853A
Authority
CN
China
Prior art keywords
files
default checking
checking information
app
current authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611239459.2A
Other languages
Chinese (zh)
Other versions
CN106843853B (en
Inventor
吴朝彬
胡昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co Ltd filed Critical Beijing 58 Information Technology Co Ltd
Priority to CN201611239459.2A priority Critical patent/CN106843853B/en
Publication of CN106843853A publication Critical patent/CN106843853A/en
Application granted granted Critical
Publication of CN106843853B publication Critical patent/CN106843853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms
    • G06F8/315Object-oriented languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Abstract

The present invention provides a kind of method and apparatus for protecting user profile; stored in SO files by by default checking information; before APP and server carry out data interaction; APP ends obtain current authentication information; determine whether checking information is consistent with the presupposed information in SO files; if current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned.If current authentication information is inconsistent with default checking information in SO files, null value is returned;Due to default checking information is encapsulated in SO files, increases and crack difficulty, therefore, cracker cannot obtain default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.

Description

The method and apparatus for protecting user profile
Technical field
The present invention relates to computer technology, more particularly to a kind of method and apparatus for protecting user profile.
Background technology
Along with developing rapidly for mobile phone application, application program (Application, abbreviation of electronic equipment:APP) also obtain Extensive use is arrived.APP independent operatings in the electronic device, data interaction is carried out by with background server, realizes the work(of APP Energy.
In correlation technique, when APP sends network request to server, network request is encrypted using public key, serviced Device is decrypted by the network request after private key pair encryption, the validity of the parameter transmitted in verification network request.
However, using the method for prior art, if application program is by decompiling, it is easy to which be cracked out public key, cracks Person by forge public key to background server circulate initiate network request, Brute Force user profile, therefore, use in the prior art The security of family information is not high.
The content of the invention
The present invention provides a kind of method and apparatus for protecting user profile, to improve the security of user profile.
One aspect of the invention provides a kind of method for protecting user profile, including:
Obtain current authentication information;
Judge whether current authentication information is consistent with the default checking information in shared component SO files;
If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;
If current authentication information is inconsistent with default checking information in SO files, null value is returned.
Alternatively, the method also includes:
Network request is sent to server.
Alternatively, before judging whether current authentication information is consistent with the default checking information in SO files, also include:
Obtain default checking information;
It is encapsulated into the code that C language or C Plus Plus are realized, default checking information according to code building SO files;
By the storage of SO files in application APP.
Alternatively, default checking information includes:The public key of APP and/or the signature file of APP.
Alternatively, presetting checking information includes the public key of APP;
Be encapsulated into the code that C language or C Plus Plus are realized default checking information, according to code building SO by method Before file, also include:
Consult APP public keys with server.
Another aspect of the invention provides a kind of device of protection user profile, including:
Acquisition module, for obtaining current authentication information;
Processing module, for judge current authentication information whether with shared component SO files in default checking information one Cause;If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;If current authentication information It is inconsistent with default checking information in SO files, then return to null value.
Alternatively, the device also includes:
Sending module, for sending network request to server.
Alternatively, acquisition module is additionally operable to obtain default checking information;
Processing module is additionally operable to default checking information, is encapsulated into the code that C language or C Plus Plus are realized, according to Code building SO files;By the storage of SO files in application APP.
Alternatively, default checking information includes:The public key of APP and/or the signature file of APP.
Alternatively, presetting checking information includes the public key of APP;
Acquisition module is additionally operable to consult APP public keys with server.
The method and apparatus of the protection user profile that the present invention is provided, store in SO files by by default checking information In, before APP and server carry out data interaction, APP ends obtain current authentication information, determine whether checking information is literary with SO Presupposed information in part is consistent, if current authentication information is consistent with the default checking information in SO files, returns to encrypted word Symbol string.If current authentication information is inconsistent with default checking information in SO files, null value is returned;Due to default checking being believed Breath is encapsulated in SO files, is increased and is cracked difficulty, therefore, cracker cannot obtain default checking information, and then, it is impossible to simulate Network request, so that, user profile is protected, improve the security of user profile.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also Other accompanying drawings are obtained with according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the embodiment of the method one of present invention protection user profile;
Fig. 2 is the schematic flow sheet of the embodiment of the method two of present invention protection user profile;
Fig. 3 is the schematic flow sheet of the embodiment of the method three of present invention protection user profile;
Fig. 4 is the structural representation of the device embodiment one of present invention protection user profile.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in description and claims of this specification and above-mentioned accompanying drawing Four " etc. (if present) is for distinguishing similar object, without for describing specific order or precedence.Should manage Solution so data for using can be exchanged in the appropriate case, so that embodiments of the invention described herein for example can be removing Order beyond those for illustrating herein or describing is implemented.Additionally, term " comprising " and " having " and theirs is any Deformation, it is intended that covering is non-exclusive to be included, for example, containing process, method, system, the product of series of steps or unit Product or equipment are not necessarily limited to those steps clearly listed or unit, but may include not list clearly or for this A little processes, method, product or other intrinsic steps of equipment or unit.
The present invention is stored in shared component (Share Obiect, abbreviation by by default checking information:SO) in file, Before APP carries out data interaction with server, APP ends are first verified to current authentication information, specifically, obtain current authentication Information, determines whether checking information is consistent with the presupposed information in SO files, if pre- in current authentication information and SO files If checking information is consistent, then encrypted characters string is returned.If current authentication information is inconsistent with default checking information in SO files, Then return to null value;Due to default checking information is encapsulated in SO files, increases and crack difficulty, therefore, cracker cannot obtain To default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.
Technical scheme is described in detail with specifically embodiment below.These specific implementations below Example can be combined with each other, and may be repeated no more in some embodiments for same or analogous concept or process.
Fig. 1 is the schematic flow sheet of the embodiment of the method one of present invention protection user profile, and the present embodiment is held by APP ends OK, the method for the present embodiment is as follows:
S101:Obtain current authentication information.
Wherein, account of the current authentication information generally with APP is uniquely corresponding, for example:Can be public key, the label of APP of APP Name file or other information.
S102:Judge whether current authentication information is consistent with the default checking information in shared component SO files;If so, then S103 is performed, if it is not, then performing S104.
Wherein, default checking information is included but is not limited to:The public key of APP and/or the signature file of APP.
Wherein, the public key of APP is used to be encrypted the network request sent to server.
The signature file of APP, this document compiling generation in packing, it is unique and can not repeat, it can be ensured that APP is only One property.
When the default checking information in judging current authentication information and SO files is consistent, then S103 is performed.When judgement is worked as When default checking information in preceding checking information and SO files is inconsistent, the sender for illustrating current authentication information should be illegal User, then perform S104.
S103:Return to encrypted characters string.
S104:Return to null value.
S105:Encrypted characters string is sent to server.
Server is decrypted by private key pair encryption character string, but is verified, return responds to APP ends.
For example:
Wherein, one example of the public key of APP is as follows:
“MIICdwIBADANBgkqhksdfsfsdfsiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMWRKAbbwylnEesVEi+ XxIU7D0zjaxeUjkZdavJCIv6xFLumM6MkvAxeo4nXtrCdM/ In1ogbfUBEKiWl7HxmcRbWrjl0uso7A4SxwZhgynCxdfsH4cXQqt61GaLmbzIEvD8H1BazNCwerwe rewrsdfhPDHdswkxKo0sdfsdfjrEuRh2h7+ mfdsf9fcQPAgMBAAECgYEAv9F1eWM5kyM9ZG9q3saNyYVUD6TmP1i+4lalFV1dOMeZh6+Qhx+ NbL0eLyE/gS7AVqaTRkbaTuFfwnnsdfsdWi4757TY7QMdLHPN0LGeWDSA+/+ UjkT8m4QyTAHV3hUjQd519swo1GuuzLhCFhoYV+ gW0kvWP3Ksdfasfcbyi17yedBpmECQQDq4n0DvD0isf76rotwxDo7OsRrbEsdfasfwerfXgxlQLsf sfsfsdfshMB/CG7bcmq3hZDbQ4sxzCqu2FQDBE8Mk5AsfkEA11PbucHT+0/ Jy2sfSSG7BfwQ6Iy1hwRGiV/WLJIrL4ycdwdGFeNdzCV2ekCj1cb/ cxTifL1Cdm9elWiSVBPfhwJBAMEOS0aIr49JgiYoXbIymPkeXhbmhTC9cvao8zYhAAPgb/ sdfsfsfs/DGxw5pJQwY0c7A6S2IeTb5Oo0PLFAsIZr0Epuje9FOEqkCQEvq16L0Q/ AvY4m8PPikscYrCOsD05sL6jnPQJKNbXO+CwKgZe52VhG0Ze1Ru2dEKlJJLjym9GVLBm2CpMtaxFg ="
Message Digest Algorithm 5 (Message Digest Algorithm, referred to as:MD5) as a example by certificate, following institute Show:
“DC6DBD6E49682A57A8B82889043B93A8”
The present embodiment, stores in SO files by by default checking information, APP and server carry out data interaction it Before, APP ends obtain current authentication information, determine whether checking information is consistent with the presupposed information in SO files, if currently tested Card information is consistent with the default checking information in SO files, then return to encrypted characters string.If in current authentication information and SO files Default checking information it is inconsistent, then return to null value;Due to default checking information is encapsulated in SO files, increases and crack difficulty Degree, therefore, cracker cannot obtain default checking information, and then, it is impossible to analog network is asked, so that, user profile is protected, carry The security of user profile high.
Fig. 2 is the schematic flow sheet of the embodiment of the method two of present invention protection user profile, and Fig. 2 is being implemented shown in Fig. 1 On the basis of example, further, before S102, also include:
S1001:Obtain default checking information.
Default checking information includes but is not limited to following at least one:
The signature file of APP public keys and APP.
S1002:It is encapsulated into the code that C language or C Plus Plus are realized, default checking information according to code building SO files.
Wherein, a kind of possible implementation is:
Write the code that C voices or C Plus Plus are realized, realization judge current authentication information whether with code in preset The consistent logic of checking information, if unanimously, being carried out to network request according to part or full detail in default checking information Encryption, generates encrypted characters string.Using Java local interfaces (Java Native Interface, abbreviation:JNI) feature, uses Native language kit (native development kit, referred to as:NDK), by Android.mk files, by C language or The language that person's C Plus Plus written in code can be recognized into JAVA, ultimately generates SO files.
Wherein, the difference of the CPU models that SO files can be in the operating system of electronic equipment, can be divided into a lot Kind, for example:" armeabi-v7a " etc., because of its backward compatible characteristic, it is only necessary to be placed under armeabi files.
S1003:By the storage of SO files in application APP.
Wherein, a kind of possible implementation is to store in specified catalogue, such as android engineerings SO files Under " main/jinLibs/armeabi " file, the catalogue is typically the catalogue that android engineerings are specified.The SO files can be with Loaded by JAVA codes.
The present embodiment, by obtaining default checking information, by default checking information, is encapsulated into C language or C Plus Plus reality In existing code, according to code building SO files, by the storage of SO files in application APP.So as to realize default checking Information is stored in APP in the form of binary file, is increased and is cracked difficulty, therefore, cracker cannot obtain default checking Information, and then, it is impossible to analog network is asked, so that, user profile is protected, improve the security of user profile.
Fig. 3 is the schematic flow sheet of the embodiment of the method three of present invention protection user profile, and Fig. 3 is being implemented shown in Fig. 2 On the basis of example, when the public key of APP is included in default checking information, before S1001, also include:
S1000:APP consults APP public keys with server.
APP consults APP public keys in advance with server, the request encryption for APP ends to being sent to server;The public key APP and server each preserve portion, and server again in addition more stores a private keys, for the encrypted characters string sent to APP It is decrypted.
The present embodiment, by way of APP and server consult, determines APP public keys, is carried out with server in order to APP It is encrypted during data interaction, improves the security of user profile.
Fig. 4 is the structural representation of the device embodiment one of present invention protection user profile, and the device of the present embodiment includes: Acquisition module 401 and processing module 402, wherein,
Acquisition module 401 is used to obtain current authentication information;
Processing module 402 be used for judge current authentication information whether with shared component SO files in default checking information one Cause;If current authentication information is consistent with the default checking information in SO files, encrypted characters string is returned;If current authentication information It is inconsistent with default checking information in SO files, then return to null value.
Wherein, default checking information includes:The public key of APP and/or the signature file of APP.
In fig. 4, can also include:Sending module 403 is used to send network request to server.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 1, its realization principle and technology Effect is similar to, and here is omitted.
On the basis of the device embodiment one of protection user profile, the device reality of the protection user profile that the present invention is provided Apply in example two, acquisition module 401 is additionally operable to obtain default checking information;Processing module 402 is additionally operable to default checking information, envelope It is attached in the code that C language or C Plus Plus are realized, according to code building SO files;By the storage of SO files in application APP In.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 2, its realization principle and technology Effect is similar to, and here is omitted.
On the basis of the device embodiment one of protection user profile, the device reality of the protection user profile that the present invention is provided Apply in example two, presetting checking information includes the public key of APP;Acquisition module 401 is additionally operable to consult APP public keys with server.
The present embodiment, the corresponding technical scheme that can be used to perform embodiment of the method shown in Fig. 3, its realization principle and technology Effect is similar to, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, performs the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. it is a kind of protect user profile method, it is characterised in that including:
Obtain current authentication information;
Judge whether the current authentication information is consistent with the default checking information in shared component SO files;
If the current authentication information is consistent with the default checking information in the SO files, encrypted characters string is returned;
If the current authentication information is inconsistent with default checking information in the SO files, null value is returned.
2. method according to claim 1, it is characterised in that also include:
The encrypted characters string is sent to server.
3. method according to claim 2, it is characterised in that it is described judge the current authentication information whether with SO files In default checking information it is consistent before, also include:
Obtain the default checking information;
It is encapsulated into the code that C language or C Plus Plus are realized, the default checking information according to the code building SO File;
By SO files storage in application APP.
4. method according to claim 3, it is characterised in that the default checking information includes:The public key of APP and/or The signature file of the APP.
5. method according to claim 4, it is characterised in that the default checking information includes the public key of APP;
Be encapsulated into the code that C language or C Plus Plus are realized the default checking information, according to the generation by methods described Before code generation SO files, also include:
Consult the APP public keys with the server.
6. it is a kind of protect user profile device, it is characterised in that including:
Acquisition module, for obtaining current authentication information;
Processing module, for judge the current authentication information whether with shared component SO files in default checking information one Cause;If the current authentication information is consistent with the default checking information in the SO files, encrypted characters string is returned;If described Current authentication information is inconsistent with default checking information in the SO files, then return to null value.
7. device according to claim 6, it is characterised in that also include:
Sending module, for sending the network request to server.
8. device according to claim 7, it is characterised in that the acquisition module is additionally operable to obtain the default checking letter Breath;
The processing module is additionally operable to the default checking information, is encapsulated into the code that C language or C Plus Plus are realized, According to the code building SO files;By SO files storage in application APP.
9. device according to claim 8, it is characterised in that the default checking information includes:The public key of APP and/or The signature file of the APP.
10. device according to claim 9, it is characterised in that the default checking information includes the public key of APP;
The acquisition module is additionally operable to consult the APP public keys with the server.
CN201611239459.2A 2016-12-28 2016-12-28 Method and device for protecting user information Active CN106843853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611239459.2A CN106843853B (en) 2016-12-28 2016-12-28 Method and device for protecting user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611239459.2A CN106843853B (en) 2016-12-28 2016-12-28 Method and device for protecting user information

Publications (2)

Publication Number Publication Date
CN106843853A true CN106843853A (en) 2017-06-13
CN106843853B CN106843853B (en) 2020-09-08

Family

ID=59114043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611239459.2A Active CN106843853B (en) 2016-12-28 2016-12-28 Method and device for protecting user information

Country Status (1)

Country Link
CN (1) CN106843853B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474617A (en) * 2018-12-17 2019-03-15 武汉斗鱼鱼乐网络科技有限公司 Call method, device, terminal and the storage medium of function in a kind of SO file

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832398A (en) * 2006-04-14 2006-09-13 中国软件与技术服务股份有限公司 Method and system of file encipher share
US20140019765A1 (en) * 2011-01-07 2014-01-16 Thomson Licensing Device and method for online storage, transmission device and method, and receiving device and method
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
CN104615933A (en) * 2015-01-27 2015-05-13 北京奇虎科技有限公司 Method for preventing software decompilation and method and device for preventing decompilation software from starting
CN104903909A (en) * 2013-03-15 2015-09-09 甲骨文国际公司 Intra-computer protected communications between applications
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832398A (en) * 2006-04-14 2006-09-13 中国软件与技术服务股份有限公司 Method and system of file encipher share
US20140019765A1 (en) * 2011-01-07 2014-01-16 Thomson Licensing Device and method for online storage, transmission device and method, and receiving device and method
CN104903909A (en) * 2013-03-15 2015-09-09 甲骨文国际公司 Intra-computer protected communications between applications
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
CN104615933A (en) * 2015-01-27 2015-05-13 北京奇虎科技有限公司 Method for preventing software decompilation and method and device for preventing decompilation software from starting
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
远方夕阳: "android so 文件存私密数据,且防止 so文件未知应用盗用", 《HTTPS://BLOG.CSDN.NET/XX753277/ARTICLE/DETAILS/37567951》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474617A (en) * 2018-12-17 2019-03-15 武汉斗鱼鱼乐网络科技有限公司 Call method, device, terminal and the storage medium of function in a kind of SO file
CN109474617B (en) * 2018-12-17 2021-07-23 武汉斗鱼鱼乐网络科技有限公司 Method, device, terminal and storage medium for calling functions in SO file

Also Published As

Publication number Publication date
CN106843853B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN105683990B (en) Method and apparatus for protecting dynamic base
CN107430658B (en) Security software certification and verifying
CN107743115B (en) Identity authentication method, device and system for terminal application
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
CN105812366B (en) Server, anti-crawler system and anti-crawler verification method
CN106656513B (en) The secondary packing signature verification method of APK file on Android platform
CN104636444B (en) A kind of encryption and decryption method and device of database
CN105340211A (en) System and methods for encrypting data
CN109284585B (en) Script encryption method, script decryption operation method and related device
CN106452786A (en) Encryption and decryption processing method, apparatus and device
CN111475824A (en) Data access method, device, equipment and storage medium
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN101894232B (en) Safe input method applied to identity authentication
CN109660353A (en) A kind of application program installation method and device
CN106897761A (en) A kind of two-dimensional code generation method and device
CN111143877B (en) Python-based wind and light prediction algorithm file encryption method and device
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN114547558A (en) Authorization method, authorization control method and device, equipment and medium
KR20110072111A (en) Method and system for preventing outflow in software source code
CN114626079A (en) File viewing method, device, equipment and storage medium based on user permission
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
JP4998314B2 (en) Communication control method and communication control program
US20110145568A1 (en) Handling of the usage of software in a disconnected computing environment
CN106843853A (en) The method and apparatus for protecting user profile
CN103813321A (en) Agreement key based data processing method and mobile phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant